Movatterモバイル変換


[0]ホーム

URL:


US20240346155A1 - Memory protection - Google Patents

Memory protection
Download PDF

Info

Publication number
US20240346155A1
US20240346155A1US18/299,216US202318299216AUS2024346155A1US 20240346155 A1US20240346155 A1US 20240346155A1US 202318299216 AUS202318299216 AUS 202318299216AUS 2024346155 A1US2024346155 A1US 2024346155A1
Authority
US
United States
Prior art keywords
data item
item
metadata
data
encrypted
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
US18/299,216
Inventor
Roberto Avanzi
Andreas Lars SANDBERG
Ionut Alexandru MIHALCEA
David Helmut Schall
Alexander Klimov
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ARM Ltd
Original Assignee
ARM Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ARM LtdfiledCriticalARM Ltd
Priority to US18/299,216priorityCriticalpatent/US20240346155A1/en
Assigned to ARM LIMITEDreassignmentARM LIMITEDASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: AVANZI, ROBERTO, MIHALCEA, Ionut Alexandru, KLIMOV, ALEXANDER, SANDBERG, Andreas Lars, SCHALL, David Helmut
Publication of US20240346155A1publicationCriticalpatent/US20240346155A1/en
Pendinglegal-statusCriticalCurrent

Links

Images

Classifications

Definitions

Landscapes

Abstract

Apparatuses and methods for memory protection are disclosed. A memory protection apparatus is interposed between a system cache and a memory system. The apparatus comprises encryption circuitry, which encrypts data item in dependence on encryption metadata and decrypts encrypted data items in dependence on the encryption metadata. In response to a change in a metadata item of the encryption metadata, when no cached copy of an affected data item is currently in the system cache, the affected data item is retrieved from the memory system, re-encrypted using the updated metadata item and returned to the memory system. When there is a cached copy, in dependence on update control data, the copy is retrieved from the system cache, encrypted using the updated metadata item and written out to the memory system.

Description

Claims (11)

We claim:
1. An apparatus for memory protection comprising:
a system cache interface configured to couple the apparatus to a system cache;
a memory system interface configured to couple to apparatus to a memory system;
encryption circuitry configured to encrypt a data item received via the system cache interface in dependence on encryption metadata to produce an encrypted data item for passing via the memory system interface to the memory system and configured to decrypt a received encrypted data item received via the memory system interface in dependence on the encryption metadata to produce a decrypted data item for provision via the system cache interface; and
update control circuitry responsive to a change in a metadata item of the encryption metadata to:
determine at least one affected data item which has been encrypted using the metadata item;
determine whether there is a cached copy of the at least one affected data item currently in the system cache; and
when there is not the cached copy of at least one affected data item currently in the system cache to cause an encrypted version of the at least one affected data item to be retrieved from the memory system, to be decrypted using the metadata item in pre-change form, to be encrypted using the metadata item in post-change form, and to be returned to the memory system, and
when there is the cached copy of the at least one affected data item currently in the system cache, in dependence on update control data, to cause the at least one affected data item to be retrieved from the system cache, to be encrypted using the metadata item in post-change form, and to be written out to the memory system.
2. The apparatus as claimed inclaim 1, wherein the update control circuitry is responsive to the change in the metadata item of the encryption metadata, when there is the cached copy of the at least one affected data item currently in the system cache,
when the update control data has a first value, to cause the cached copy of the at least one affected data item to be retrieved from the system cache, to be encrypted using the metadata item in post-change form, and to be written out to the memory system,
and when the update control data has a second value, to cause the cached copy of the at least one affected data item to be marked as modified in the system cache.
3. The apparatus as claimed inclaim 2, wherein the update control circuitry is configured to maintain the update control data in a dynamic manner, wherein the update control data takes the first value or the second value in dependence on at least one dynamic factor when the apparatus is in operation.
4. The apparatus as claimed inclaim 3, wherein the at least one dynamic factor comprises an indication of a master device accessing the at least one affected data item.
5. The apparatus as claimed inclaim 3, wherein the at least one dynamic factor comprises a category of data to which the at least one affected data item has been assigned.
6. The apparatus as claimed inclaim 3, wherein the at least one dynamic factor comprises a data access pattern indicator, wherein the data access pattern indicator has been empirically determined from previous data access patterns.
7. The apparatus as claimed inclaim 1, wherein the update control data is set to cause the at least one affected data item to be retrieved from the system cache, to be encrypted using the metadata item in post-change form, and to be written out to the memory system.
8. The apparatus as claimed inclaim 1, wherein the encryption circuitry comprises counter circuitry configured to maintain at least one count value, wherein the encryption metadata comprises the at least one count value, and wherein the encryption circuitry is configured to encrypt the data item received via the system cache interface in dependence on the at least one count value and to decrypt the received encrypted data item received via the memory system interface in dependence on the at least one count value,
and wherein the change in the metadata item of the encryption metadata comprises an incrementing of the at least one count value by the counter circuitry configured.
9. The apparatus as claimed inclaim 1, further comprising data integrity checking circuitry configured to generate an integrity value for the data item received via the system cache interface and to cause the integrity value to be stored in association with the encrypted data item in the memory system,
and configured to regenerate the integrity value in dependence on the received encrypted data item and to compare the regenerated integrity value with the integrity value stored in association with the encrypted data item to verify the integrity of the received encrypted data item.
10. A data processing system comprising:
a plurality of data processing devices, wherein at least one of the plurality of data processing devices is provided with a private cache;
the apparatus for memory protection as claimed inclaim 1;
the system cache;
and the memory system,
wherein the update control circuitry is responsive to the change in the metadata item of the encryption metadata to determine whether there is a locally cached copy of the at least one affected data item currently in the private cache of at least one of the plurality of data processing devices,
and when there is the locally cached copy of the at least one affected data item to cause the locally cached copy to be brought into the system cache.
11. A method of memory protection comprising:
receiving a data item from a system cache via a system cache interface;
encrypting the data item in dependence on encryption metadata to produce an encrypted data item;
passing the encrypted data item via a memory system interface to a memory system;
receiving the encrypted data item received via the memory system interface;
decrypting the encrypted data item in dependence on the encryption metadata to produce a decrypted data item for provision via the system cache interface;
responding to a change in a metadata item of the encryption metadata by:
determining at least one affected data item which has been encrypted using the metadata item;
determining whether there is a cached copy of the at least one affected data item currently in the system cache; and
when there is not the cached copy of at least one affected data item currently in the system cache to cause an encrypted version of the at least one affected data item to be retrieved from the memory system, to be decrypted using the metadata item in pre-change form, to be encrypted using the metadata item in post-change form, and to be returned to the memory system, and
when there is the cached copy of the at least one affected data item currently in the system cache, in dependence on update control data, to cause the at least one affected data item to be retrieved from the system cache, to be encrypted using the metadata item in post-change form, and to be written out to the memory system.
US18/299,2162023-04-122023-04-12Memory protectionPendingUS20240346155A1 (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
US18/299,216US20240346155A1 (en)2023-04-122023-04-12Memory protection

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
US18/299,216US20240346155A1 (en)2023-04-122023-04-12Memory protection

Publications (1)

Publication NumberPublication Date
US20240346155A1true US20240346155A1 (en)2024-10-17

Family

ID=93016646

Family Applications (1)

Application NumberTitlePriority DateFiling Date
US18/299,216PendingUS20240346155A1 (en)2023-04-122023-04-12Memory protection

Country Status (1)

CountryLink
US (1)US20240346155A1 (en)

Similar Documents

PublicationPublication DateTitle
US10733313B2 (en)Counter integrity tree for memory security
US10558377B2 (en)Deduplication-based data security
Ren et al.Design space exploration and optimization of path oblivious ram in secure processors
CN104392188B (en)A kind of secure data store method and system
US10204229B2 (en)Method and system for operating a cache in a trusted execution environment
CN110945509B (en) Apparatus and method for controlling access to data in a protected memory region
US11658808B2 (en)Re-encryption following an OTP update event
US20110153944A1 (en)Secure Cache Memory Architecture
KR102117838B1 (en) Methods for protecting security-related data in cache memory
EP3899774A1 (en)Integrity tree for memory integrity checking
Elbaz et al.A parallelized way to provide data encryption and integrity checking on a processor-memory bus
Rogers et al.Single-level integrity and confidentiality protection for distributed shared memory multiprocessors
Dickens III et al.Strongbox: Confidentiality, integrity, and performance using stream ciphers for full drive encryption
KR20230036129A (en) Memory protection using cached partial hash values
US20240080193A1 (en)Counter integrity tree
US20240346155A1 (en)Memory protection
US12248409B2 (en)Apparatus and method of controlling access to data stored in a non-trusted memory
Meng et al.Tree Technology for Memory Confidentiality Integrity Protection
CN119918079A (en) Data processing method, computer device, storage medium and program product

Legal Events

DateCodeTitleDescription
STPPInformation on status: patent application and granting procedure in general

Free format text:DOCKETED NEW CASE - READY FOR EXAMINATION

ASAssignment

Owner name:ARM LIMITED, UNITED KINGDOM

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:AVANZI, ROBERTO;MIHALCEA, IONUT ALEXANDRU;SANDBERG, ANDREAS LARS;AND OTHERS;SIGNING DATES FROM 20230329 TO 20230414;REEL/FRAME:064356/0234

STPPInformation on status: patent application and granting procedure in general

Free format text:NON FINAL ACTION COUNTED, NOT YET MAILED

STPPInformation on status: patent application and granting procedure in general

Free format text:NON FINAL ACTION MAILED


[8]ページ先頭

©2009-2025 Movatter.jp